EP2485512A1 - Encryption device and method for controlling download and access of mobile terminal - Google Patents

Encryption device and method for controlling download and access of mobile terminal Download PDF

Info

Publication number
EP2485512A1
EP2485512A1 EP10788733A EP10788733A EP2485512A1 EP 2485512 A1 EP2485512 A1 EP 2485512A1 EP 10788733 A EP10788733 A EP 10788733A EP 10788733 A EP10788733 A EP 10788733A EP 2485512 A1 EP2485512 A1 EP 2485512A1
Authority
EP
European Patent Office
Prior art keywords
encryption
chip
encryption chip
mobile terminal
switch circuit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP10788733A
Other languages
German (de)
French (fr)
Other versions
EP2485512A4 (en
EP2485512B1 (en
Inventor
Ke Liu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Publication of EP2485512A1 publication Critical patent/EP2485512A1/en
Publication of EP2485512A4 publication Critical patent/EP2485512A4/en
Application granted granted Critical
Publication of EP2485512B1 publication Critical patent/EP2485512B1/en
Not-in-force legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Definitions

  • the disclosure relates to encryption technique of mobile terminals, and in particular to an encryption device and method for controlling download and access operations performed to a mobile terminal.
  • the mobile phone With the fast development of mobile terminal, the amount of mobile phone users is increased day by day.
  • the mobile phone In order to prevent hackers from carrying out download operation on the mobile phone through a computer and from accessing the internal procedure of the memory of the mobile terminal by accessing the master chip of the mobile phone so as to crack the lock network locking card function of the mobile phone, the mobile phone usually needs to be protected through encryption added by a manufacturer.
  • Message-Digest Algorithm 5 (MD5) is usually adopted as cryptographic algorithm for carrying out encryption on the internal procedure of the memory of the mobile terminal.
  • MD5 Message-Digest Algorithm 5
  • the cryptographic algorithm is an exhaustive encryption algorithm
  • the encrypted procedure is required to be decrypted before the mobile phone runs, which leads to long turn-on time of the mobile phone due to long decryption time.
  • just a few important codes in the internal procedure of the memory of the mobile phone are encrypted under normal conditions.
  • the encrypted code segment is easily replaced by a substitute code segment to run the whole procedure, so that download and access operations performed to the mobile phone is performed by the computer through the connector of the mobile phone.
  • Another encryption manner combined with a platform is as follows: after the serial number of the chip of the mobile phone is bond with that of the memory of the mobile phone, a ciphertext is stored in the memory, and the serial numbers of the ciphertext are verified after every turn-on operation; if the serial numbers obtained after verifying are identical to that of the master chip of the mobile phone and that of the memory of the mobile phone, the procedure runs.
  • the encryption manner is still adopted for the encryption of a few code segments, and similarly can be decrypted by the hackers; therefore, the security of the mobile phone is reduced.
  • the above encryption manners are both adopted for the encryption of a few code segments in the internal procedure of the memory of the mobile phone, and belong to software encryption manner; the encrypted procedure can be decrypted as long as the encrypted code segment is replaced by the substitute code segment by the hackers, and the download and access operations can be performed to the mobile phone through the connector of the mobile phone, so as to seriously influence the security of the mobile phone; therefore, it is especially important to look for a more high-effective encryption manner.
  • the main purpose of the disclosure is to provide an encryption device and method for controlling download and access operations performed to a mobile terminal, through which the encrypted code segments in the memory of the mobile terminal cannot be replaced, so that the security of the download and access operations performed to the mobile terminal is improved.
  • an encryption device for controlling download and access operations performed to a mobile terminal, which includes a switch circuit and an encryption chip.
  • the switch circuit is disposed on a download channel between a master chip of the mobile terminal and a connector of the mobile terminal and is configured to control an on-off of the download channel.
  • the encryption chip is disposed on a mainboard of the mobile terminal and is configured to control an on-off of the switch circuit through states of the encryption chip.
  • the switch circuit includes an N channel insulated gate field effect transistor, a drain electrode of the field effect transistor is connected with a read pin of the master chip of the mobile terminal through a pull-up resistor, a source electrode of the field effect transistor is connected with a read pin of the connector of the mobile terminal, and a gate electrode of the field effect transistor is connected with a control end of the encryption chip.
  • the encryption chip has a protecting state and a non-protecting state.
  • the control end of the encryption chip When the encryption chip is set to be in the protecting state, the control end of the encryption chip outputs a low level, the switch circuit is closed, and the download channel is connected; when the encryption chip is set to be in the non-protecting state, the control end of the encryption chip outputs a high level, the switch circuit is open, and the download channel is disconnected.
  • a power supply source of the encryption chip is provided by an output power source of the master chip of the mobile terminal.
  • the device further includes an access software and a dongle.
  • the access software is connected with an external device and the encryption chip, through the access software, the external device accesses the encryption chip.
  • the dongle is configured to protect access security of the access software.
  • an encryption method for controlling download and access operations performed to the mobile terminal includes the following steps: disposing a switch circuit on a download channel between a master chip of the mobile terminal and a connector of the mobile terminal, and connecting or disconnecting the download channel by controlling an on-off of the switch circuit according to states of an encryption chip.
  • the method before setting the state of the encryption chip, the method further includes the following steps: the external device opens an access software through a dongle, accesses the encryption chip through the access software, and sets the state of the encryption chip.
  • the switch circuit includes an N channel insulated gate field effect transistor, a drain electrode of the field -effect transistor is connected with a read pin of the master chip of the mobile terminal through a pull-up resistor, a source electrode of the field effect transistor is connected with the read pin of the connector of the mobile terminal, and a gate electrode of the field effect transistor is connected with a control end of the encryption chip.
  • the step of controlling the on-off of the switch circuit according to states of the encryption chip includes that: when the encryption chip is set to be in a protecting state, a control end of the encryption chip outputs a low level, the switch circuit is open, and the download channel is disconnected; when the encryption chip is set to be in a non-protecting state, a control end of the encryption chip outputs a high level, the switch circuit is closed, and the download channel is connected.
  • a power supply source of the encryption chip is provided by an output power source of the master chip of the mobile terminal.
  • a switch circuit is disposed on the download channel between the master chip of the mobile terminal and the connector of the mobile terminal, the access software is opened and the encryption chip is accessed by using the dongle, the on-off of the switch circuit is controlled by setting states of the encryption chip, so as to control the on-off of the download channel to achieve the purpose for controlling the download and access operations performed to the mobile terminal by a computer.
  • the mobile terminal is encrypted for protection, through a combination of hardware encryption and software encryption, so that it is impossible for hackers to replace and crack the encryption procedure of the memory of the mobile terminal using substitute code segments, so as to effectively improve the security and reliability of the download and access operations performed to the mobile terminal.
  • a switch circuit is disposed on the download channel between the master chip of the mobile terminal and the connector of the mobile terminal, and the on-off of the switch circuit is controlled through the states of the encryption chip to control the on-off of the download channel so as to control the download and access operations performed to the mobile terminal by the external device, thereby improving the security and reliability of the mobile terminal.
  • the mobile terminal is a mobile phone.
  • the encryption device for controlling the download and access operations performed to the mobile terminal includes a switch circuit and an encryption chip.
  • the switch circuit is disposed on a download channel between the master chip of the mobile terminal and the connector of the mobile terminal and is configured to control the on-off of the download channel; that is, when the switch circuit is closed, the download channel is connected; when the switch circuit is open, the download channel is disconnected.
  • the switch circuit comprises an N channel insulated gate field effect transistor (MOS transistor, for short); the MOS transistor has three electrodes of source electrode S, drain electrode D and gate electrode G which are respectively S electrode, D electrode and G electrode for short.
  • the D electrode of the MOS transistor is connected with the read pin RX of the master pin of the mobile phone through a pull-up resistor; the S electrode of the MOS transistor is connected with the read pin RX of the connector of the mobile phone; and the G electrode of the MOS transistor is connected with the control end EN of the encryption chip.
  • the on-off of the switch circuit is controlled through the output level of the control end EN of the encryption chip so as to control the on-off of the download channel.
  • control end EN When the control end EN outputs a high level, that is, when the G electrode has a high level, the MOS transistor is turned on, the switch circuit is closed, the download channel between the master chip of the mobile phone and the connector of the mobile phone is connected, and the external device such as the computer can perform download and access operations to the mobile phone.
  • the control end EN When the control end EN outputs a low level, that is, the G electrode has a low level, the MOS transistor is turned off, the switch circuit is open, the download channel between the master chip of the mobile phone and the connector of the mobile phone is disconnected, and the external device such as the computer cannot perform download or access operations to the mobile phone.
  • the resistance value of the pull-up resistor is not specially limited, but the D electrode could produce relatively large sink current if the resistance value is too small so as to cause influence on the switch circuit; preferably, the resistance value of the pull-up resistor is 100 kilohms.
  • the encryption chip is disposed on the mainboard of the mobile phone for controlling the on-off of the switch circuit through the states of the encryption chip.
  • the control end EN of the encryption chip is connected with the G electrode of the MOS transistor, and the output level of the control end EN of the encryption chip is controlled through the states of the encryption chip so as to control the on-off of the switch circuit.
  • the state of the encryption chip can be set to be a protecting state and a non-protecting state; when the encryption chip is set to be in the protecting state, the control end EN of the encryption chip outputs a low level, the switch circuit is open; when the encryption chip is set to be in non-protecting state, the control end EN of the encryption chip outputs a high level, the switch circuit is closed.
  • the power supply source of the encryption chip is provided by the output power source of the master chip of the mobile phone, so as to guarantee that the encryption chip is simultaneously powered on when the master chip of the mobile phone is powered on, no matter the information saved on the mobile phone is downloaded or accessed.
  • the device further includes a dongle and an access software.
  • the access software is a special access tool for the encryption chip and is used with the encryption chip and the dongle for accessing the encryption chip.
  • the control procedure programmed in advance in the computer is downloaded inside the encryption chip through the special download wire for the encryption chip after the access software is opened through the dongle by the computer, or the state of the encryption chip is set by modifying the key of the encryption chip.
  • the disclosure provides an encryption method for controlling the download and access operations to the mobile terminal. as shown in Fig. 2 , the method comprises the following steps.
  • Step 200 A switch circuit is disposed on the download channel between the master chip of the mobile terminal and the connector of the mobile terminal.
  • control end EN When the control end EN outputs a high level, that is, when the G electrode has a high level, the MOS transistor is turned on, the switch circuit is closed, the download channel between the master chip of the mobile phone and the connector of the mobile phone is connected, and the external device such as the computer can perform download and access operations to the mobile phone.
  • the control end EN When the control end EN outputs a low level, that is, the G electrode has a low level, the MOS transistor is turned off, the switch circuit is open, the download channel between the master chip of the mobile phone and the connector of the mobile phone is disconnected, and the external device such as the computer cannot perform download and access operations to the mobile phone.
  • the resistance value of the pull-up resistor is not specially limited, but the D electrode could produce relatively large sink current if the resistance value is too small so as to cause influence on the switch circuit; preferably, the resistance value of the pull-up resistor is 100 kilohms.
  • Step 201 An external device accesses the encryption chip through an access software, and sets the state of the encryption chip; determining whether the encryption chip is set to be in the protecting state, Step 202 is performed when the encryption chip is set to be in the protecting state; and Step 204 is performed when the encryption chip is set to be in the non-protecting state; in the step, the external device, such as a computer, accesses the encryption chip through the access software so as to set the state of the encryption chip.
  • the dongle is a special tool for opening the access software by the computer in order to protect the access security of the access software; and the access software can be opened just by inserting the dongle into the computer and then inputting correct passwords so as to access the encryption chip. If the dongle is not inserted in the computer, the access software cannot be opened, and the encryption chip also cannot be accessed. Under normal conditions, the dongle cannot be obtained and cracked easily by the hackers, so the access security and reliability of the access software can be guaranteed.
  • the control procedure programmed in advance in the computer is downloaded inside the encryption chip through the special download wire for the encryption chip after the access software is opened through the dongle by the compute.
  • the control procedure is used for controlling the state of the encryption chip.
  • the control procedure also needs to be encrypted for protection; and the encryption manner can be an exhaustive encryption manner in the prior art without description here in detail.
  • the control procedure after being encrypted for protection is programmed independently and is completely independent of the internal procedure of the memory of the mobile phone, and cannot be obtained and cracked easily by the hackers.
  • the state of the encryption chip can be modified through the key of the encryption chip.
  • the state of the encryption chip can be set to be the protecting state or the non-protecting state.
  • the control end EN of the encryption chip When the encryption chip is in the protecting state, the control end EN of the encryption chip outputs a low level; when the encryption chip is in the non-protecting state, the control end EN of the encryption chip outputs a high level.
  • the download wire can be pulled out to quit the access software and the dongle; the encryption chip is disconnected with the computer so that a person without the dongle cannot modify the control procedure inside the encryption chip so as to achieve the protection function for the state of the encryption chip.
  • Steps 202-203 the encryption chip is set to be in the protecting state, the control end outputs a low level, the switch circuit is open, the download channel is disconnected, the external device cannot perform the download and access operations to the mobile phone, and the current processing procedure is completed.
  • the power supply source of the encryption chip is provided by the output power source of the master chip of the mobile phone, thus the encryption chip can be powered on simultaneously when the master chip of the mobile phone is powered on no matter the information saved on the mobile phone is downloaded or accessed, so as to control the on-off of the download channel in order to achieve the protection function for the master chip.
  • the encryption chip is powered on simultaneously.
  • the control end EN of the encryption chip outputs a low level; since the control end EN is connected with the G electrode of the MOS transistor, the G electrode of the MOS transistor is also at a low level; the MOS transistor is turned off, the switch circuit is open, and the download channel between the master chip of the mobile phone and the connector of the mobile phone is turned off.
  • the external device such as the computer, cannot carry out download operation to the mobile phone through the connector of the mobile phone, and cannot access the master chip of the mobile phone through the connector of the mobile phone so as to access the internal procedure of the memory of the mobile phone.
  • the control end EN of the encryption chip outputs the high level, that is, the G electrode of the MOS transistor is at the high level, the MOS transistor is turned on, the switch circuit is closed, and the download channel between the master chip of the mobile phone and the connector of the mobile phone performs data transmission through RS232 serial signals.
  • the dongle is required to be inserted in the external device, such as the computer, again and then correct passwords are input, and the access software is opened.
  • the encryption chip is accessed by the computer through the special download wire for the encryption chip, and the key of the encryption chip is modified in order to reset the sates of the encryption chip; the download wire can be pulled out after the setting is completed, and the access software and the dongle are quit in order to protect the state of the encryption chip from being modified by others.
  • the switch circuit of the disclosure is disposed on the download channel of the master chip and the connector of the mobile phone so as to just control the on-off of the download channel. Therefore, the mobile phone is protected only when the external device, such as the computer, performs download and access operations to the mobile phone. The mobile phone is not damaged when the mater chip of the mobile phone uploads data to the computer through the connector of the mobile phone, thus no switch circuit is disposed on the upload channel between the mater chip of the mobile phone and the connector of the mobile phone.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

An encryption device and method for controlling download and access operations performed to a mobile terminal are disclosed. A switch circuit (102) is disposed on download channels (107, 108) between the master chip (101) of the mobile terminal and the connector (103) of the mobile terminal, an access software (105) is opened and an encryption chip (106) is accessed by using a dongle (112), the on-off of the switch circuit (102) is controlled by setting states of the encryption chip (106), so as to control the on-off of download channels (107, 108) to control the download and access operations performed to the mobile terminal by a computer (104). According to the device and method, hackers cannot crack the internal procedure of the memory of the mobile terminal using substitute code segments, thereby effectively improving the security and reliability of the download and access operations performed to the mobile terminal.

Description

    TECHNICAL FIELD
  • The disclosure relates to encryption technique of mobile terminals, and in particular to an encryption device and method for controlling download and access operations performed to a mobile terminal.
  • BACKGROUND
  • With the fast development of mobile terminal, the amount of mobile phone users is increased day by day. In order to prevent hackers from carrying out download operation on the mobile phone through a computer and from accessing the internal procedure of the memory of the mobile terminal by accessing the master chip of the mobile phone so as to crack the lock network locking card function of the mobile phone, the mobile phone usually needs to be protected through encryption added by a manufacturer.
  • In the prior art, Message-Digest Algorithm 5 (MD5) is usually adopted as cryptographic algorithm for carrying out encryption on the internal procedure of the memory of the mobile terminal. Since the cryptographic algorithm is an exhaustive encryption algorithm, when the mobile phone is turned on, the encrypted procedure is required to be decrypted before the mobile phone runs, which leads to long turn-on time of the mobile phone due to long decryption time. To reduce the turn-on time of the mobile phone, just a few important codes in the internal procedure of the memory of the mobile phone are encrypted under normal conditions. However, for the hackers familiar with the internal procedure of the memory of the mobile phone, the encrypted code segment is easily replaced by a substitute code segment to run the whole procedure, so that download and access operations performed to the mobile phone is performed by the computer through the connector of the mobile phone.
  • Another encryption manner combined with a platform is as follows: after the serial number of the chip of the mobile phone is bond with that of the memory of the mobile phone, a ciphertext is stored in the memory, and the serial numbers of the ciphertext are verified after every turn-on operation; if the serial numbers obtained after verifying are identical to that of the master chip of the mobile phone and that of the memory of the mobile phone, the procedure runs. However, the encryption manner is still adopted for the encryption of a few code segments, and similarly can be decrypted by the hackers; therefore, the security of the mobile phone is reduced.
  • The above encryption manners are both adopted for the encryption of a few code segments in the internal procedure of the memory of the mobile phone, and belong to software encryption manner; the encrypted procedure can be decrypted as long as the encrypted code segment is replaced by the substitute code segment by the hackers, and the download and access operations can be performed to the mobile phone through the connector of the mobile phone, so as to seriously influence the security of the mobile phone; therefore, it is especially important to look for a more high-effective encryption manner.
  • SUMMARY
  • Therefore, the main purpose of the disclosure is to provide an encryption device and method for controlling download and access operations performed to a mobile terminal, through which the encrypted code segments in the memory of the mobile terminal cannot be replaced, so that the security of the download and access operations performed to the mobile terminal is improved.
  • To achieve the purpose, following technical solutions of the disclosure are provided.
  • In one aspect, an encryption device for controlling download and access operations performed to a mobile terminal is provided, which includes a switch circuit and an encryption chip. The switch circuit is disposed on a download channel between a master chip of the mobile terminal and a connector of the mobile terminal and is configured to control an on-off of the download channel. The encryption chip is disposed on a mainboard of the mobile terminal and is configured to control an on-off of the switch circuit through states of the encryption chip.
  • Preferably, the switch circuit includes an N channel insulated gate field effect transistor, a drain electrode of the field effect transistor is connected with a read pin of the master chip of the mobile terminal through a pull-up resistor, a source electrode of the field effect transistor is connected with a read pin of the connector of the mobile terminal, and a gate electrode of the field effect transistor is connected with a control end of the encryption chip.
  • Preferably, the encryption chip has a protecting state and a non-protecting state.
  • When the encryption chip is set to be in the protecting state, the control end of the encryption chip outputs a low level, the switch circuit is closed, and the download channel is connected; when the encryption chip is set to be in the non-protecting state, the control end of the encryption chip outputs a high level, the switch circuit is open, and the download channel is disconnected.
  • Preferably, a power supply source of the encryption chip is provided by an output power source of the master chip of the mobile terminal.
  • Preferably, the device further includes an access software and a dongle. The access software is connected with an external device and the encryption chip, through the access software, the external device accesses the encryption chip. The dongle is configured to protect access security of the access software.
  • In another aspect, an encryption method for controlling download and access operations performed to the mobile terminal is provided, which includes the following steps: disposing a switch circuit on a download channel between a master chip of the mobile terminal and a connector of the mobile terminal, and connecting or disconnecting the download channel by controlling an on-off of the switch circuit according to states of an encryption chip.
  • Preferably, before setting the state of the encryption chip, the method further includes the following steps: the external device opens an access software through a dongle, accesses the encryption chip through the access software, and sets the state of the encryption chip.
  • Preferably, the switch circuit includes an N channel insulated gate field effect transistor, a drain electrode of the field -effect transistor is connected with a read pin of the master chip of the mobile terminal through a pull-up resistor, a source electrode of the field effect transistor is connected with the read pin of the connector of the mobile terminal, and a gate electrode of the field effect transistor is connected with a control end of the encryption chip.
  • Preferably, the step of controlling the on-off of the switch circuit according to states of the encryption chip includes that: when the encryption chip is set to be in a protecting state, a control end of the encryption chip outputs a low level, the switch circuit is open, and the download channel is disconnected; when the encryption chip is set to be in a non-protecting state, a control end of the encryption chip outputs a high level, the switch circuit is closed, and the download channel is connected.
  • Preferably, a power supply source of the encryption chip is provided by an output power source of the master chip of the mobile terminal.
  • According to the encryption device and method for controlling download and access operations of the mobile terminal, a switch circuit is disposed on the download channel between the master chip of the mobile terminal and the connector of the mobile terminal, the access software is opened and the encryption chip is accessed by using the dongle, the on-off of the switch circuit is controlled by setting states of the encryption chip, so as to control the on-off of the download channel to achieve the purpose for controlling the download and access operations performed to the mobile terminal by a computer.
  • According to the device and method of the disclosure, the mobile terminal is encrypted for protection, through a combination of hardware encryption and software encryption, so that it is impossible for hackers to replace and crack the encryption procedure of the memory of the mobile terminal using substitute code segments, so as to effectively improve the security and reliability of the download and access operations performed to the mobile terminal.
  • BRIEF DESCRIPTION OF THE DRAWINGS
    • Fig. 1 shows a structural diagram of an encryption device for controlling download and access operations performed to the mobile terminal of the disclosure; and
    • Fig. 2 shows a flowchart of an encryption method for controlling download and access operations performed to the mobile terminal of the disclosure.
    DETAILED DESCRIPTION
  • The main idea of the disclosure is that: a switch circuit is disposed on the download channel between the master chip of the mobile terminal and the connector of the mobile terminal, and the on-off of the switch circuit is controlled through the states of the encryption chip to control the on-off of the download channel so as to control the download and access operations performed to the mobile terminal by the external device, thereby improving the security and reliability of the mobile terminal.
  • The device and method of the disclosure are detailed below in conjunction with the specific embodiment. In the embodiment, the mobile terminal is a mobile phone.
  • According to the present disclosure, the encryption device for controlling the download and access operations performed to the mobile terminal, as shown in Fig. 1, includes a switch circuit and an encryption chip.
  • The switch circuit is disposed on a download channel between the master chip of the mobile terminal and the connector of the mobile terminal and is configured to control the on-off of the download channel; that is, when the switch circuit is closed, the download channel is connected; when the switch circuit is open, the download channel is disconnected.
  • According to the PN junction characteristic of semiconductor, field effect transistor can be divided into P channel field effect transistor and N channel field effect transistor. In the embodiment, the switch circuit comprises an N channel insulated gate field effect transistor (MOS transistor, for short); the MOS transistor has three electrodes of source electrode S, drain electrode D and gate electrode G which are respectively S electrode, D electrode and G electrode for short. The D electrode of the MOS transistor is connected with the read pin RX of the master pin of the mobile phone through a pull-up resistor; the S electrode of the MOS transistor is connected with the read pin RX of the connector of the mobile phone; and the G electrode of the MOS transistor is connected with the control end EN of the encryption chip. The on-off of the switch circuit is controlled through the output level of the control end EN of the encryption chip so as to control the on-off of the download channel.
  • When the control end EN outputs a high level, that is, when the G electrode has a high level, the MOS transistor is turned on, the switch circuit is closed, the download channel between the master chip of the mobile phone and the connector of the mobile phone is connected, and the external device such as the computer can perform download and access operations to the mobile phone. When the control end EN outputs a low level, that is, the G electrode has a low level, the MOS transistor is turned off, the switch circuit is open, the download channel between the master chip of the mobile phone and the connector of the mobile phone is disconnected, and the external device such as the computer cannot perform download or access operations to the mobile phone. The resistance value of the pull-up resistor is not specially limited, but the D electrode could produce relatively large sink current if the resistance value is too small so as to cause influence on the switch circuit; preferably, the resistance value of the pull-up resistor is 100 kilohms.
  • The encryption chip is disposed on the mainboard of the mobile phone for controlling the on-off of the switch circuit through the states of the encryption chip.
  • Here, the control end EN of the encryption chip is connected with the G electrode of the MOS transistor, and the output level of the control end EN of the encryption chip is controlled through the states of the encryption chip so as to control the on-off of the switch circuit. The state of the encryption chip can be set to be a protecting state and a non-protecting state; when the encryption chip is set to be in the protecting state, the control end EN of the encryption chip outputs a low level, the switch circuit is open; when the encryption chip is set to be in non-protecting state, the control end EN of the encryption chip outputs a high level, the switch circuit is closed. The power supply source of the encryption chip is provided by the output power source of the master chip of the mobile phone, so as to guarantee that the encryption chip is simultaneously powered on when the master chip of the mobile phone is powered on, no matter the information saved on the mobile phone is downloaded or accessed.
  • In the disclosure, a control procedure programmed in advance in the computer is downloaded inside the encryption chip through a special download wire for the encryption chip so as to control the state of the encryption chip; moreover, the state of the encryption chip can be modified by modifying the key of the encryption chip. The control procedure is used for controlling the state of the encryption chip; the control procedure also needs to be encrypted for protection; and the encryption manner can be an exhaustive encryption manner in the prior art without description here in detail. The control procedure after being encrypted for protection is programmed independently and is completely independent of the internal procedure of the memory of the mobile phone, and is not easy to be obtained and cracked by the hackers.
  • The device further includes a dongle and an access software.
  • The dongle is a special tool for opening the access software by the computer and is used the access software in order to protect the access security of the access software; and the access software can be opened just by inserting the dongle into the computer and then inputting correct passwords.
  • The access software is a special access tool for the encryption chip and is used with the encryption chip and the dongle for accessing the encryption chip. The control procedure programmed in advance in the computer is downloaded inside the encryption chip through the special download wire for the encryption chip after the access software is opened through the dongle by the computer, or the state of the encryption chip is set by modifying the key of the encryption chip.
  • Based on the device, the disclosure provides an encryption method for controlling the download and access operations to the mobile terminal. as shown in Fig. 2, the method comprises the following steps.
  • Step 200: A switch circuit is disposed on the download channel between the master chip of the mobile terminal and the connector of the mobile terminal.
  • In the step, the switch circuit consists of an N channel insulated gate field effect transistor (MOS transistor, for short); the MOS transistor has three electrodes of source electrode S, drain electrode D and gate electrode G which are respectively S electrode, D electrode and G electrode for short. The D electrode of the MOS transistor is connected with the read pin RX of the master pin of the mobile phone through a pull-up resistor; the S electrode of the MOS transistor is connected with the read pin RX of the connector of the mobile phone; and the G electrode of the MOS transistor is connected with the control end EN of the encryption chip. The on-off of the switch circuit is controlled through the output level of the control end EN of the encryption chip so as to control the on-off of the download channel.
  • When the control end EN outputs a high level, that is, when the G electrode has a high level, the MOS transistor is turned on, the switch circuit is closed, the download channel between the master chip of the mobile phone and the connector of the mobile phone is connected, and the external device such as the computer can perform download and access operations to the mobile phone. When the control end EN outputs a low level, that is, the G electrode has a low level, the MOS transistor is turned off, the switch circuit is open, the download channel between the master chip of the mobile phone and the connector of the mobile phone is disconnected, and the external device such as the computer cannot perform download and access operations to the mobile phone. The resistance value of the pull-up resistor is not specially limited, but the D electrode could produce relatively large sink current if the resistance value is too small so as to cause influence on the switch circuit; preferably, the resistance value of the pull-up resistor is 100 kilohms.
  • Step 201: An external device accesses the encryption chip through an access software, and sets the state of the encryption chip; determining whether the encryption chip is set to be in the protecting state, Step 202 is performed when the encryption chip is set to be in the protecting state; and Step 204 is performed when the encryption chip is set to be in the non-protecting state;
    in the step, the external device, such as a computer, accesses the encryption chip through the access software so as to set the state of the encryption chip. The dongle is a special tool for opening the access software by the computer in order to protect the access security of the access software; and the access software can be opened just by inserting the dongle into the computer and then inputting correct passwords so as to access the encryption chip. If the dongle is not inserted in the computer, the access software cannot be opened, and the encryption chip also cannot be accessed. Under normal conditions, the dongle cannot be obtained and cracked easily by the hackers, so the access security and reliability of the access software can be guaranteed.
  • The control procedure programmed in advance in the computer is downloaded inside the encryption chip through the special download wire for the encryption chip after the access software is opened through the dongle by the compute. The control procedure is used for controlling the state of the encryption chip. The control procedure also needs to be encrypted for protection; and the encryption manner can be an exhaustive encryption manner in the prior art without description here in detail. The control procedure after being encrypted for protection is programmed independently and is completely independent of the internal procedure of the memory of the mobile phone, and cannot be obtained and cracked easily by the hackers.
  • Moreover, the state of the encryption chip can be modified through the key of the encryption chip. The state of the encryption chip can be set to be the protecting state or the non-protecting state. When the encryption chip is in the protecting state, the control end EN of the encryption chip outputs a low level; when the encryption chip is in the non-protecting state, the control end EN of the encryption chip outputs a high level. After the configuration of the state of the encryption chip is finished, the download wire can be pulled out to quit the access software and the dongle; the encryption chip is disconnected with the computer so that a person without the dongle cannot modify the control procedure inside the encryption chip so as to achieve the protection function for the state of the encryption chip.
  • Here, a USB signal is converted into a RS232 serial signal through a USB switch serial port for realizing data transmission when the encryption chip is accessed through the special download wire by the computer. When the encryption chip is in the protecting state, the Step 202 is performed; when the encryption chip is in the non-protecting sate, the Step 204 is performed.
  • Steps 202-203: the encryption chip is set to be in the protecting state, the control end outputs a low level, the switch circuit is open, the download channel is disconnected, the external device cannot perform the download and access operations to the mobile phone, and the current processing procedure is completed.
  • In the embodiment, the power supply source of the encryption chip is provided by the output power source of the master chip of the mobile phone, thus the encryption chip can be powered on simultaneously when the master chip of the mobile phone is powered on no matter the information saved on the mobile phone is downloaded or accessed, so as to control the on-off of the download channel in order to achieve the protection function for the master chip.
  • In the step, when the master chip of the mobile phone is powered on, the encryption chip is powered on simultaneously. When the encryption chip is set to be in the protecting state, the control end EN of the encryption chip outputs a low level; since the control end EN is connected with the G electrode of the MOS transistor, the G electrode of the MOS transistor is also at a low level; the MOS transistor is turned off, the switch circuit is open, and the download channel between the master chip of the mobile phone and the connector of the mobile phone is turned off. The external device, such as the computer, cannot carry out download operation to the mobile phone through the connector of the mobile phone, and cannot access the master chip of the mobile phone through the connector of the mobile phone so as to access the internal procedure of the memory of the mobile phone.
  • Under normal conditions, the encryption chip is in the protecting state when the mobile phone leaves the factory in order to prevent others from carrying out download operation to the mobile phone at random and from accessing the master chip of the mobile phone at random without permission so as to access the internal procedure of the memory of the mobile phone.
  • Steps 204-205: the encryption chip is set to be in the non-protecting state, the control end outputs a high level, the switch circuit is closed, the download channel is connected, and the external device can perform the download and access operations to the mobile phone.
  • In the step, when the encryption chip is in the non-protecting state, the control end EN of the encryption chip outputs the high level, that is, the G electrode of the MOS transistor is at the high level, the MOS transistor is turned on, the switch circuit is closed, and the download channel between the master chip of the mobile phone and the connector of the mobile phone performs data transmission through RS232 serial signals.
  • In the embodiment, if the state of the encryption chip needs to be modified, from the protecting state to the non-protecting state, or from the non-protecting state to the protecting sate, the dongle is required to be inserted in the external device, such as the computer, again and then correct passwords are input, and the access software is opened. The encryption chip is accessed by the computer through the special download wire for the encryption chip, and the key of the encryption chip is modified in order to reset the sates of the encryption chip; the download wire can be pulled out after the setting is completed, and the access software and the dongle are quit in order to protect the state of the encryption chip from being modified by others.
  • Moreover, the switch circuit of the disclosure is disposed on the download channel of the master chip and the connector of the mobile phone so as to just control the on-off of the download channel. Therefore, the mobile phone is protected only when the external device, such as the computer, performs download and access operations to the mobile phone. The mobile phone is not damaged when the mater chip of the mobile phone uploads data to the computer through the connector of the mobile phone, thus no switch circuit is disposed on the upload channel between the mater chip of the mobile phone and the connector of the mobile phone.
  • The above is only the preferred embodiment of the disclosure and not intended to limit the scope of protection of the disclosure. Any modifications, equivalent replacements, improvements without departing from the spirit and principle of the disclosure shall fall within the scope of protection of the disclosure.

Claims (10)

  1. An encryption device for controlling download and access operations performed to a mobile terminal, comprising: a switch circuit and an encryption chip, wherein,
    the switch circuit is disposed on a download channel between a master chip of the mobile terminal and a connector of the mobile terminal and is configured to control an on-off of the download channel, and
    the encryption chip is disposed on a mainboard of the mobile terminal and is configured to control an on-off of the switch circuit through states of the encryption chip.
  2. The encryption device according to claim 1, wherein the switch circuit comprises an N channel insulated gate field effect transistor, a drain electrode of the field effect transistor is connected with a read pin of the master chip of the mobile terminal through a pull-up resistor, a source electrode of the field effect transistor is connected with a read pin of the connector of the mobile terminal, and a gate electrode of the field effect transistor is connected with a control end of the encryption chip.
  3. The encryption device according to claim 1, wherein the encryption chip has a protecting state and a non-protecting state;
    when the encryption chip is set to be in the protecting state, the control end of the encryption chip outputs a low level, the switch circuit is closed, and the download channel is connected; when the encryption chip is set to be in the non-protecting state, the control end of the encryption chip outputs a high level, the switch circuit is open, and the download channel is disconnected.
  4. The encryption device according to claim 1 or 3, wherein a power supply source of the encryption chip is provided by an output power source of the master chip of the mobile terminal.
  5. The encryption device according to claim 1, 2 or 3, further comprising an access software and a dongle; wherein,
    the access software is connected with an external device and the encryption chip, through which the external device accesses the encryption chip, and
    the dongle is configured to protect access security of the access software.
  6. An encryption method for controlling download and access operations performed to the mobile terminal, comprising:
    disposing a switch circuit on a download channel between a master chip of the mobile terminal and a connector of the mobile terminal; and
    connecting or disconnecting the download channel by controlling an on-off of the switch circuit according to states of an encryption chip.
  7. The encryption method according to claim 6, further comprising steps, preceding the step of setting the states of the encryption chip, of: opening, by the external device, an access software through a dongle, accessing the encryption chip through the access software, and setting the states of the encryption chip.
  8. The encryption method according to claim 6, wherein the switch circuit comprises an N channel insulated gate field effect transistor, a drain electrode of the field effect transistor is connected with a read pin of the master chip of the mobile terminal through a pull-up resistor, a source electrode of the field effect transistor is connected with a read pin of the connector of the mobile terminal, and a gate electrode of the field effect transistor is connected with a control end of the encryption chip.
  9. The encryption method according to claim 6, 7 or 8, wherein controlling the on-off of the switch circuit according to states of the encryption chip comprises:
    when the encryption chip is set to be in a protecting state, a control end of the encryption chip outputting a low level, the switch circuit being open, and the download channel being disconnected; when the encryption chip is set to be in a non-protecting state, the control end of the encryption chip outputting a high level, the switch circuit being closed, and the download channel being connected.
  10. The encryption method according to claim 6, wherein a power supply source of the encryption chip is provided by an output power source of the master chip of the mobile terminal.
EP10788733.3A 2009-11-05 2010-04-28 Encryption device and method for controlling download and access operations performed to a mobile terminal Not-in-force EP2485512B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2009102372192A CN102055830A (en) 2009-11-05 2009-11-05 Encryption device and method for controlling downloading and access of mobile terminal (MT)
PCT/CN2010/072301 WO2010145337A1 (en) 2009-11-05 2010-04-28 Encryption device and method for controlling download and access of mobile terminal

Publications (3)

Publication Number Publication Date
EP2485512A1 true EP2485512A1 (en) 2012-08-08
EP2485512A4 EP2485512A4 (en) 2013-07-10
EP2485512B1 EP2485512B1 (en) 2018-02-07

Family

ID=43355781

Family Applications (1)

Application Number Title Priority Date Filing Date
EP10788733.3A Not-in-force EP2485512B1 (en) 2009-11-05 2010-04-28 Encryption device and method for controlling download and access operations performed to a mobile terminal

Country Status (4)

Country Link
US (1) US8661239B2 (en)
EP (1) EP2485512B1 (en)
CN (1) CN102055830A (en)
WO (1) WO2010145337A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109743206A (en) * 2018-12-28 2019-05-10 南京工程学院 A kind of softdog and application method based on EtherCAT

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8107819B2 (en) 2007-05-31 2012-01-31 Industrial Technology Research Institute Systems and methods for interference prediction
CN102149081B (en) * 2011-03-18 2016-06-08 中兴通讯股份有限公司 A kind of device preventing illegal download
CN103200562A (en) * 2012-01-10 2013-07-10 国民技术股份有限公司 Communication terminal locking method and communication terminal
CN103379483B (en) * 2012-04-16 2017-06-06 中兴通讯股份有限公司 A kind of method of information of mobile terminal safety management, device and mobile terminal
CN104850763B (en) * 2015-04-07 2017-09-15 广东欧珀移动通信有限公司 It is a kind of to connect the interface circuit and control method for downloading key
CN104933349B (en) * 2015-05-20 2017-10-13 广东欧珀移动通信有限公司 With the USB switching devices and download verification method for downloading authentication function
CN105471876A (en) * 2015-12-02 2016-04-06 东莞见达信息技术有限公司 Encryption communication method and device
CN108733997B (en) * 2018-04-04 2021-09-24 广东南方电力通信有限公司 Mobile power data monitoring system and method based on fingerprint identification
CN111046414B (en) 2018-10-15 2023-07-25 中兴通讯股份有限公司 Mobile terminal, switch control method, and computer-readable storage medium
CN109587111A (en) * 2018-10-24 2019-04-05 江苏税软软件科技有限公司 A kind of protecting information safety method using USB softdog

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005046233A1 (en) * 2003-10-16 2005-05-19 Stmicroelectronics Limited Security integrated circuit

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2160940Y (en) 1993-02-24 1994-04-06 汤军其 Disk writing protecting structure for microcomputer
EP0998059A1 (en) * 1998-10-30 2000-05-03 ICO Services Ltd. Mobile communication terminal with a removable data module for access to a first or second communication network
CN1101024C (en) * 1999-08-13 2003-02-05 王本中 Method and device for encrypting computer hard disc
CN1314031C (en) 2000-02-21 2007-05-02 特科2000国际有限公司 Portable data storage device
CN100473195C (en) * 2001-12-30 2009-03-25 中兴通讯股份有限公司 Encrypted card and its application method in mobile terminal
US7890997B2 (en) * 2002-12-26 2011-02-15 Avaya Inc. Remote feature activation authentication file system
CN2731839Y (en) 2004-02-09 2005-10-05 联想(北京)有限公司 Device for locking switching control key of electronic device
US7383438B2 (en) * 2004-12-18 2008-06-03 Comcast Cable Holdings, Llc System and method for secure conditional access download and reconfiguration
GB2440041B (en) * 2006-07-10 2011-08-24 Hes Ltd Memory devices and security systems and apparatus for use with such memory devices
CN200990610Y (en) * 2006-10-27 2007-12-12 上海复旦微电子股份有限公司 Communication ciphered cell phone
JP2008225672A (en) 2007-03-09 2008-09-25 Toshiba Corp Semiconductor memory device
US7761714B2 (en) * 2008-10-02 2010-07-20 Infineon Technologies Ag Integrated circuit and method for preventing an unauthorized access to a digital value
CN101384042A (en) * 2008-10-15 2009-03-11 东南大学 Mobile phone ciphering method based on safe digital interface ciphering card
CN101488952A (en) 2008-12-10 2009-07-22 华中科技大学 Mobile storage apparatus, data secured transmission method and system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005046233A1 (en) * 2003-10-16 2005-05-19 Stmicroelectronics Limited Security integrated circuit

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
None *
See also references of WO2010145337A1 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109743206A (en) * 2018-12-28 2019-05-10 南京工程学院 A kind of softdog and application method based on EtherCAT

Also Published As

Publication number Publication date
WO2010145337A1 (en) 2010-12-23
CN102055830A (en) 2011-05-11
US20120246460A1 (en) 2012-09-27
EP2485512A4 (en) 2013-07-10
US8661239B2 (en) 2014-02-25
EP2485512B1 (en) 2018-02-07

Similar Documents

Publication Publication Date Title
US8661239B2 (en) Encryption device and method for controlling download and access operations performed to a mobile terminal
US8296565B2 (en) Communication protocol for device authentication
US9363079B2 (en) Method of generating message authentication code and authentication device and authentication request device using the method
US8700908B2 (en) System and method for managing secure information within a hybrid portable computing device
Parno Bootstrapping Trust in a" Trusted" Platform.
KR102608961B1 (en) Method for device-dependent encryption and apparatus performing the same
US8301888B2 (en) System and method for generating secured authentication image files for use in device authentication
CN111404682B (en) Android environment key segmentation processing method and device
CN101854243A (en) Circuit system design encryption circuit and encryption method thereof
CN104867885A (en) Self-destruct nonvolatile memory chip and preparation method thereof
US11405202B2 (en) Key processing method and apparatus
CN106919858B (en) Chip, and data protection device and method of chip
KR20140017035A (en) Audio security storage system and method for managing certification using the same
CN106027258A (en) TPM-based household appliance remote control method
CN102104864A (en) Method for realizing network and card locking function of terminal and terminal
CN101924766A (en) Double-network communication method
CN207367209U (en) From encryption hard-disk system
WO2009010919A2 (en) Dongle for functionally testing an electronic device
Xu et al. An Implementation of a Chip Security Mechanism
US8095805B2 (en) Security flash memory, data encryption device and method for accessing security flash memory
CN105550602A (en) Secure computer motherboard encrypted based on State-Cryptography-Administration algorithm and encryption method
CN201429848Y (en) Encrypted USB device
KR20090042706A (en) Device for storing encrypted backup data and storing apparatus using thereof
WO2013056522A1 (en) Device and method for realizing network-locking of mobile terminal
CN105184139B (en) A kind of implementation method of encryption data switching equipment

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20120328

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20130611

RIC1 Information provided on ipc code assigned before grant

Ipc: G06F 21/72 20130101AFI20130605BHEP

Ipc: H04W 12/00 20090101ALI20130605BHEP

Ipc: G06F 21/74 20130101ALI20130605BHEP

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20170412

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 602010048415

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: H04W0012000000

Ipc: H04W0012080000

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

RIC1 Information provided on ipc code assigned before grant

Ipc: H04W 12/02 20090101ALI20170822BHEP

Ipc: H04W 12/08 20090101AFI20170822BHEP

Ipc: G06F 21/74 20130101ALI20170822BHEP

INTG Intention to grant announced

Effective date: 20170905

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 969224

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180215

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602010048415

Country of ref document: DE

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 9

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20180207

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 969224

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180207

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180507

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180507

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180508

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180607

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602010048415

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20180430

26N No opposition filed

Effective date: 20181108

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180428

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180430

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180430

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180430

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180428

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20190503

Year of fee payment: 10

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20190430

Year of fee payment: 10

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20190430

Year of fee payment: 10

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180428

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20100428

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180207

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180207

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 602010048415

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200430

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201103

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20200428

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200428